Rina Steenkamp - Privacy and technology

Weblog

2013

December

[Memorandum Opinion [Klayman et al. v. Obama et al.] | Liberty and security in a changing world | What information do data brokers have on consumers, and how do they use it? | A review of the data broker industry - collection, use and sale of consumer data for marketing purposes | Ten commandments of internet law revisited - basic principles for internet lawyers | Biometrics - friend or foe of privacy? | Cryptography as a service in a cloud computing environment | Privacy-preserving charging for eMobility | Rolling plan for ICT standardisation (2013) | UK cyber security standards - Research report | 2013 Information security breaches survey - Technical report | According to the Advocate General [...] the Data Retention Directive is incompatible with the Charter of Fundamental Rights | How these 5 dirtbags radically advanced your digital rights | New documents show how the NSA infers relationships based on mobile location data | The FBI's next generation identification program - Big Brother's ID system? | Chilling effects - NSA surveillance drives U.S. writers to self-censor | "Small" breach, big harm. | View from the precipice - Mobile financial malware | Security threat report 2014 - Smarter, shadier, stealthier malware | ENISA threat landscape 2013 - Overview of current and emerging cyber-threats | How the Bitcoin protocol actually works | Digital evidence, digital investigations and e-disclosure - A guide to forensic readiness for organisations, security advisers and lawyers | Foreign surveillance and human rights | Digital activism and non-violent conflict | Mayority is not enough - Bitcoin mining is vulnerable | Serious security - How to store your users' passwords safely | Security of eGovernment systems | Cloud standards coordination - Final report | Security breach notification chart | Special Eurobarometer 404 - Cyber security | [...] on the functioning of the Safe Harbour from the perspective of EU citizens and companies established in the EU | Problems with the FISC's newly-declassified opinion on bulk collection of internet metadata | Our government has weaponized the internet. Here's how they did it | Eyes wide open | Information resellers - Consumer privacy framework needs to reflect changes in technology and the marketplace | Aiding surveillance - An exploration of how development and humanitarian aid initiatives are enabling surveillance in developing countries | An experiment in hiring discrimination via online social networks | LG Smart TVs logging USB filenames and viewing info to LG servers | Is UK college's RFID chip tracking of pupils an invasion of privacy? | Security certification practice in the EU | Good practice guide for securely deploying governmental clouds]

Onderzoeksresultaten cybercrime - Middenbedrijf onderschat risico's van cybercrime

[Lees verder]

Hoe zit het met mijn privacy, beste zorgverzekeraar?

[Lees verder]

Evaluatie Wet op de inlichtingen- en veiligheidsdiensten 2002 - Naar een nieuwe balans tussen bevoegdheden en waarborgen

[Lees verder]

ECLI:NL:RBOBR:2013:6553

[Lees verder]

Van Gasteren I en II - over WO II, het right to be left alone en hubris

[Lees verder]

Data als betaalmiddel - de nieuwe privacy

[Lees verder]